SamSam ransomware – crypto-virus that uses 13 different extensions

SamSam ransomware is a malicious program which uses RSA-2048 algorithm to encrypt victims' files. Files encrypted by malware can be recovered by entering a special code which is held by its owners. Of course, SamSam victim is required to pay a special ransom in exchange for this code. Recently, next to 12 different file extensions, it started using .weapologize extension to mark affected files.

Luckily, SamSam can be removed with anti-virus or anti-spyware software. It has been detected as Trojan.Ransom.SamSam, MSIL/Filecoder_Samas.B!tr, Backdoor.Ratenjay.Gen!c, Msil.Trojan.Dothetuk.Tccf, etc.[1]

SamSam ransomware was discovered in June 2016. During its lifetime, this crypto-virus has evolved into the whole family which uses different file extensions, email addresses and ransom notes. The latest version of this ransomware showed up in January 2018. This SamSam variant uses .weapologize file extension and 0009-SORRY-FOR-FILES.html ransom note.

When it comes to distribution, SamSam ransomware viruses are known to rely on fake email messages pretending to be notifications from UPS or similar delivery company. Once inside the system, ransomware encrypts files and provides a special email address (nullforwarding@qualityservice.com, etc.) to contact its developers. The data is typically encrypted with RSA-2048 encryption algorithm, so there is no chance to guess the code needed for its decryption.

SamSam ransomware was detected after it infected several hospitals in the United States.[2] MedStar hospital was in the worst position after this ransomware attack because it was required to pay 45 Bitcoins or $18,500 in exchange for the encrypted data. Fortunately, IT specialists in this hospital managed to remove SamSam virus and find backups of encrypted data and used them to recover affected files. Hence, cyber criminals did not receive the money.

Regarding the latter trojan name, the malware seems to contain backdoor elements. Therefore, SamSam ransomware removal should become your top priority. To get rid of this malware, you can use Reimage which will help you detect all malicious components.

Different variants of the virus might drop different versions of ransom notes. However, at the moment victims might receive one of these ransom notes: 0009-SORRY-FOR-FILES.html, IF_WANT_FILES_BACK_PLS_READ.html, 000-PLEASE-READ-WE-HELP.html, 000-No-PROBLEM-WE-DEC-FILES.html, READ-FOR-DECCCC-FILESSS.html, HELP_DECRYPT_YOUR_FILES.HTML, 001-HELP_FOR_DECRYPT_FILE.html, 006-READ-FOR-HELLPP.html, PLEASE_READ_FOR_DECRYPT_FILES_[Number].html or PLEASE-README -AFFECTED-FILES.html.

After opening the ransom note, you should see such warning:

#What happened to your files?All your files encrypted with RSA-2048 encryption. For more information search in Google “RSA Encryption.”#How to recover files?RSA is a asymmetric cryptographic algorithm, You need one key for encryption and one key for decryptionSo you need Private key to recover your files. It’s not possible to recover your files without private key#How to get private key?You can get your private key in 3 easy step:Step1: You must send us 1,7 Bitcoin for each affected PC or 29 BitCoins to receive ALL Private Keys for ALL affected PCs.Step 2: After you send us 1,7 Bitcoin, Leave a comment on our Site with this detail: Just write your “host name” in your comment.* Your host name is: XXXXXXXXXXXX[…]

We want to point out that it’s important to remove SamSam virus from the computer BEFORE it starts another round of data encryption. So you should launch your anti-spyware right after noticing suspiciou sactivity on your computer. However, if it has already begun the encryption procedure, make sure you use data recovery steps given below instead of paying the ransom.

Security researchers are working really hard to come up with the decryption tool for this particular ransomware. In the meanwhile, FBI has officially warned the corporations and businesses to increase their cyber security.[3] This was a direct response to hackers‘ ambitions to target hospitals that were attacked by this malware and Locky ransomware, which struck the Hollywood Medical Centre.

Developers of SamSam continue upgrading the virus

One of the first SamSam variants that appeared in the wild used to add .notfoundrans file extensions to all encrypted files and create a ransom note called 006-READ-FOR-HELLPP.html. Later on, the virus switched to using .wowreadfordecryp extension to every encrypted file.

Additionally, it leaves the ransom note called 000-WOW-READ-FOR-DECRYP.html. On January 4, 2017, virus emerged with a ransomware that adds .wowwhereismyfiles extensions to encoded records and drops a ransom note titled as 001-PLS-DEC-MY-FILES.html. Another variant spotted on the 1st of November 2017 is recognized from .helpmeencedfiles file extensions and HELP-ME-ENCED-FILES.html ransom note;

Just before New Year's Eve, Sam Sam attacks with a virus that renames files by adding .Whereisyourfiles file extensions and then leaves WHERE-YOUR-FILES.html ransom note on the system. On December 25, SamSam virus appeared as a virus that appends .happenencedfiles to files and leaves information about the data recovery options in 002-HAPPEN-ENCED-FILES.html file.

Less than a week earlier, on December 20, a variant adding .theworldisyours extensions and leaving CHECK-IT-HELP-FILES.html was spotted. December 15, 2016, reveals a new version that is recognized from .howcanihelpusir and READ-V-HLP-YOU.html ransom note.

The developers[4] of the original version seem to have sought inspiration from the famous Alan Moore's 1989 comic book character – V. During data encryption it attaches .VforVendetta file extension to the targeted files. However, it’s just one of the possible extensions that might damage pictures, documents, audio and video files.

In January 2017, a new version of the virus has been detected. It appends .powerfulldecrypt file extension to the corrupted files. This time the instructions are delivered in WE-MUST-DEC-FILES.html web page. What is more, SamSam launches when a trojan enters an operating system. According to the results of the analysis, security programs detect the virus under different trojan names. Some of them are Trojan[Ransom]/MSIL.Samas, Ransom.FileCryptor, and Ransom:Win32/FileCryptor. Update your security software not to get infected with this virus.

It didn’t take long for hackers to upgrade ransomware one more time. In the middle of January 2017, the new variant of SamSam was noticed appending a new file extension and delivering and the ransom note. Now it adds .noproblemwedecfiles file extension and informs about the necessity to pay the ransom in the 000-No-PROBLEM-WE-DEC-FILES.html file.

Another version of SamSam was found in the beginning of March. It uses .iaufkakfhsaraf file extension and drops the ransom note, called as: IF_WANT_FILES_BACK_PLS_READ.html.

On June 2017 the ransomware has been updated one more time. The recent variant is executed from the wound2.exe file. It appends .moments2900 file extension to the affected data and then drops a ransom note called .READ-FOR-DECCCC-FILESSS.html.

On August 2017, security experts detected newly-released versions that attached .country82000, .supported2017, .prosperous666, and .disposed2017[5] extensions. To contact their victims, these viruses used PLEASE-README -AFFECTED-FILES.html file.

After a month, the malware developers struck again with a new variation which leaves its distinctive mark – .myransext2017 file extension. Furthermore, the demands are presented in005-DO-YOU-WANT-FILES.html file. No other changes are recorded The malware is likely to spread via spam emails and infected applications as well as trojans.

On October 2017, malware researchers noticed another variant of Sam Sam spreading on Web. This time ransomware travels as a friendly2.exe file. On the affected device it should act the same as previous versions of the virus. It encrypts files using sophisticated algorithm and demands to pay the ransom.

The significant changes made in the latest versions of this ransomware are related to file extension used by it to mark affected files. This time, SamSam locks files with .loveransisgood, .fucku and .areyoulovemyrans extensions.

Methods used for spreading crypto-malware

This threat has been distributed using different methods, not only spam. The most shocking discover is that this virus has been relying on vulnerability found in JBoss application. Alternatively known as WildFly,[6] it helped the virus infect the entire network and invade several computers at the same time.

When spreading with the help of this method, the virus uses a special tool called JexBossooks to look for JBoss vulnerabilities. Once the vulnerabilities are detected, it drops Trojan:BAT/Samas.B[7] and Trojan:BAT/Samas.C.[8] to steal personal credentials. After obtaining such data, the hackers launch their ransomware as a psexec.exe file and initiate the attack of the ransomware.

Spam emails and phishing scams have also been used to spread SamSam ransomware. Beware that it can try to infiltrate your computer as an invoice, an important notification from your boss and similar document. If you are among its victims, let us proceed to SamSam removal.

Terminate SamSam from the device correctly

As we have discussed, the main features of this file-encrypting malware, completing SamSam ransomware removal might seem a troublesome and arduous job. However, if you employ the anti-malware program, the elimination process does not take long.

For it to maintain its functionalities flawlessly, you need to update the software daily. If you cannot remove SamSam virus because of the inability to launch the security program or access other important OS programs, take a look at the recovery guidelines below.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove SamSam ransomware virus you agree to our privacy policy and agreement of use.

What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.

Reimage is recommended to uninstall SamSam ransomware virus. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool. More information about this program can be found in Reimage review.

Manual SamSam virus Removal Guide:

Remove SamSam using Safe Mode with Networking

Reimage is a tool to detect malware.You need to purchase Full version to remove infections.

In some cases, ransomware prevents users from accessing or running security programs. Thus, you have to reboot your computer to the Safe Mode with Networking as shown below to start its removal. Then repeat system scan.

Step 1: Reboot your computer to Safe Mode with Networking

Windows 7 / Vista / XP

Click Start→Shutdown→Restart→OK.

When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.

Select Safe Mode with Networking from the list

Windows 10 / Windows 8

Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..

Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete SamSam removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

When a new window shows up, click Next and select your restore point that is prior the infiltration of SamSam. After doing that, click Next.

Now click Yes to start system restore.

Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that SamSam removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove SamSam from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If your files are encrypted by SamSam ransomware, you can try decrypting them only after you remove the ransomware. For that, make sure you choose one of the following methods:

If your files are encrypted by SamSam, you can use several methods to restore them:

Recover your files encrypted by SamSam virus with the help of Data Recovery Pro

If you are infected with SamSam virus, you can try using Data Recovery Pro to recover your encrypted files. This application is widely known for helping people revive their accidentally deleted files and similar data.

If you have files that are very important to you, you can try recovering them with the help of Windows Previous Versions feature. However, to use it, you need to make sure that System Restore function was enabled before the appearance of SamSam.

Find an encrypted file you need to restore and right-click on it;

Select “Properties” and go to “Previous versions” tab;

Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

SamSam decrypter

At the moment, there is a SamSam decrypter available on the Internet, however, since Google SafeBrowsing considers it dangerous, we cannot share a link to it here. We will update the article as soon as a 100% safe and official decrypter appears. Be patient!